The Latest in IT Security

Hackers Hit Yahoo Mail With Mass Account Checker Attack

31
Jan
2014

Yahoo has issued a warning of a attack targeting users of its email service, and initiating password resets for potentially affected accounts.

“Recently, we identified a coordinated effort to gain unauthorized access to Yahoo Mail accounts,” Jay Rossiter, SVP, Platforms and Personalization Products at Yahoo, wrote in a blog post Thursday. “Upon discovery, we took immediate action to protect our users, prompting them to reset passwords on impacted accounts.”

According to Rossiter, the list of usernames and passwords that was used to execute the attack was likely obtained from hacking another site and stealing the list of login credentials.

Expert Insight:Exercising Alternatives to Detect and Prevent Brute Force Attacks

Yahoo does not believe the list of accounts were obtained directly from Yahoo’s systems, and the company did not elaborate on the extent of the attack or provide any numbers as to how many accounts may have been illegally accessed or how many hack attempts were made.

The attackers appear to be after names and email addresses from the affected accounts’ most recent sent emails, Yahoo said. Such a move could help the attackers build an extended database and conduct personalized attacks appearing to be from the victimized Yahoo email account.

“Our ongoing investigation shows that malicious computer software used the list of usernames and passwords to access Yahoo Mail accounts,” Rossiter noted.

If the attack was done at scale, which it seems it was, it’s likely that the attackers made use of a botnet to execute the attack.

These types of attacks are known as “account checker attacks” and are automated attacks that are commonly used by cybercriminals to hack into user accounts. In these attacks, automated attack tools and account checker scripts are used to determine valid user ID/password combinations.

Automated attacks are nothing new, and security firms have been warning about them for years, though attackers are increasingly using automation in their ongoing attacks.

“Hackers will use brute force attacks to test stolen usernames and passwords from one source to gain access to another say, bank accounts, Facebook pages, Gmail, you name it,” Juniper Networks’ Michael Callahan wrote in a recent SecurityWeek column.

“Password reuse is rampant, even among people who should know better,” Callahan added. “The single point of failure it creates can lead to a data breach from one company causing a major ripple of compromises across many other sites.”

“Most recently, the major loss of usernames and passwords from Adobe caused Facebook and Evernote to prompt users to reset passwords to avoid these attacks,” Callahan said.

In July 2013, Akamai Technologies warned in its State of the Internet Report that it was seeing a rise in account takeover attacks hitting e-commerce companies.

Yahoo said it has implemented additional measures to block attacks against its systems, and that the company is working with federal law enforcement to investigate the attack.

Just over a week ago, Germany’s Federal Office for Online Security warned Internet users that cybercriminals had obtained a list of 16 million email addresses and passwords.

Related Reading: Hackers Just Made Off with Two Million Passwords, Now What?

Expert Insight: Exercising Alternatives to Detect and Prevent Brute Force Attacks

Tweet

Managing Editor, SecurityWeek.Previous Columns by Mike Lennon:Hackers Hit Yahoo Mail With Mass Account Checker AttackDefense.Net Launches New Service to Combat DDoS Attacks RSA Uncovers Infrastructure Behind New Point-of-Sale Attack OperationTarget: Attackers Used Stolen Vendor Credentials in Data BreachCross Platform Java-bot Launches DDoS Attacks from Windows, Mac and Linux Machines

sponsored links

Tags: NEWS INDUSTRY

Email Security

Incident Management

Tracking Law Enforcement

Cybercrime

Comments are closed.

Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments